Communication Networks
|
|
- Imogene Webb
- 5 years ago
- Views:
Transcription
1 Communication Networks Routing and Traffic Management Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto
2 Routing
3 Graph Directed and Undirected
4 Tree Trees T = (V,E)» graph with no cycles» number of edges E = V» any two vertices of the tree are connected by exactly one path A tree T is said to span a graph G = (V,E) (spanning tree) if» T = (V,E ) and E E
5 Shortest Path Trees Graphs and Trees can be weighted» G=(V,E,w)» T=(V, E,w)» w: ER Total cost of a tree T Minimum Spanning Tree T*» algorithms used to compute MST: Prism, Kruskal Shortest Path Tree (SPT) Rooted at Vertex s» tree composed by the» union of the shortest paths between s and each of other vertices of G» Algorithms used to compute SPT: Dijkstra, Bellman-Ford Computer networks use Shortest Path Trees
6 Routing in Datagram Networks
7 Forwarding, Routing Forwarding data plane» directing packet from input to output link» using a forwarding table Routing control plane» computing paths the packets will follow» routers exchanging messages» each router creating its forwarding table 0 destination address routing algorithm local forwarding table header value output link
8 Importance of Routing End-to-end performance» path affects quality of service» delay, throughput, packet loss Usage of network resources» balance traffic over routers and links» avoiding congestion by directing traffic to less-loaded links Transient disruptions» failures, maintenance» limiting packet loss and delay during changes
9 Shortest-Path Routing Path-selection model» Destination-based» Load-insensitive (e.g., static link weights)» Minimum hop count or minimum sum of link weights
10 Shortest-Path Problem Given a network topology with link costs» c(x,y) - link cost from node x to node y» Infinity - if x and y are not direct neighbors Compute the least-cost paths from source u to all nodes p(v) - node predecessor of node v in the path to u 2 u p(v) 4 3 v
11 Dijkstra s Shortest-Path Algorithm Iterative algorithm» After k iterations known least-cost paths to k nodes S set of nodes whose least-cost path is known» Initially, S={u}, where u is the source node» Add one node to S in each iteration D(v) current cost of path from source to node v» Initially D(v)=c(u,v) for all nodes v adjacent to u D(v)= for all other nodes v» Continually update D(v) when shorter paths are learned
12 Dijsktra s Algorithm Initialization: 2 S = {u} 3 for all nodes v 4 if v adjacent to u { 5 D(v) = c(u,v) } 6 else D(v) = 7 8 Loop 9 find node w not in S with the smallest D(w) 0 add w to S update D(v) for all v adjacent to w and not in S: 2 D(v) = min{d(v), D(w) + c(w,v)} 3 until all nodes in S
13 Dijkstra s Algorithm - Example
14 Dijkstra s Algorithm - Example
15 Shortest-Path Tree Shortest-path tree from u v 2 y 3 x 4 u 2 5 t w 4 3 s Forwarding table at u link z v (u,v) w (u,w) x (u,w) y (u,v) z (u,v) s (u,w) t (u,w)
16 Link-State Routing Each router keeps track of its incident links» link up, link down» cost on the link Each router broadcasts the link state every router gets a complete view of the graph Each router runs Dijkstra s algorithm, to» compute the shortest paths» construct the forwarding table Example protocols» Open Shortest Path First (OSPF)» Intermediate System Intermediate System (IS-IS)
17 Detection of Topology Changes Beacons generated by routers on links» Periodic hello messages in both directions» few missed hellos link failure hello 7
18 Broadcasting the Link State How to Flood the link state?» every node sends link-state information through adjacent links» next nodes forward that info to all links except the one where the information arrived X A C B D (a) X A C B D (b) When to initiate flooding?» Topology change link or node failure/recovery link cost change» Periodically refresh link-state information typically 30 minutes X A C B D (c) X A C B D (d)
19 Scaling Link-State Routing Overhead of link-state routing» flooding link-state packets throughout the network» running Dijkstra s shortest-path algorithm Introducing hierarchy through areas Area Area 2 area border router Area 0 Area 3 Area 4
20 Bellman-Ford Algorithm Define distances at each node x» d x (y) = cost of least-cost path from x to y Update distances based on neighbors» d x (y) = min {c(x,v) + d v (y)} over all neighbors v u 3 2 v w 4 2 x 5 s 3 4 y t z d u (z) = min{c(u,v) + d v (z), c(u,w) + d w (z)}
21 Distance Vector Algorithm c(x,v) = cost for direct link from x to v node x maintains costs of direct links c(x,v) D x (y) = estimate of least cost from x to y node x maintains distance vector D x = [D x (y): y є N ] Node x maintains also its neighbors distance vectors for each neighbor v, x maintains D v = [D v (y): y є N ] Each node v periodically sends D v to its neighbors» and neighbors update their own distance vectors» D x (y) min v {c(x,v) + D v (y)} for each node y N Over time, the distance vector D x converges
22 Distance Vector Algorithm Iterative, asynchronous each local iteration caused by: local link cost change distance vector update message from neighbor Distributed» node notifies neighbors only when its DV changes Each node: wait for (change in local link cost or message from neighbor) recompute estimates if DV to any destination has changed, notify neighbors Neighbors then notify their neighbors, if necessary
23 Distance Vector Example - Step 0 Optimum -hop paths Table for A Dst Cst Hop Table for B Dst Cst Hop E 3 C A 0 A B 4 B C D E 2 E F 6 F A 4 A B 0 B C D 3 D E F F 2 A 6 4 F B 3 D Table for C Table for D Table for E Table for F Dst Cst Hop Dst Cst Hop Dst Cst Hop Dst Cst Hop A A A 2 A A 6 A B B 3 B B B B C 0 C C C C C C D D D 0 D D D E E E 0 E E 3 E F F F F 3 F F 0 F
24 Distance Vector Example - Step Optimum 2-hop paths Table for A Dst Cst Hop Table for B Dst Cst Hop E 3 C A 0 A B 4 B C 7 F D 7 B E 2 E F 5 E A 4 A B 0 B C 2 F D 3 D E 4 F F F 2 A 6 4 F B 3 D Table for C Table for D Table for E Table for F Dst Cst Hop Dst Cst Hop Dst Cst Hop Dst Cst Hop A 7 F A 7 B A 2 A A 5 B B 2 F B 3 B B 4 F B B C 0 C C C C 4 F C C D D D 0 D D D 2 C E 4 F E E 0 E E 3 E F F F 2 C F 3 F F 0 F
25 Distance Vector Example - Step 2 Optimum 3-hop paths Table for A Dst Cst Hop Table for B Dst Cst Hop E 3 C A 0 A B 4 B C 6 E D 7 B E 2 E F 5 E A 4 A B 0 B C 2 F D 3 D E 4 F F F 2 A 6 4 F B 3 D Table for C Table for D Table for E Table for F Dst Cst Hop Dst Cst Hop Dst Cst Hop Dst Cst Hop A 6 F A 7 B A 2 A A 5 B B 2 F B 3 B B 4 F B B C 0 C C C C 4 F C C D D D 0 D D 5 F D 2 C E 4 F E 5 C E 0 E E 3 E F F F 2 C F 3 F F 0 F
26 Maximum Flow of a Network
27 Flow Network Model Flow network» source s» sink t» nodes a, b and c Edges are labeled with capacities» (e.g. bit/s) Communication networks are not flow networks» they are queue networks» flow networks enable to determine limit values
28 Maximum Capacity of a Flow Network Max-flow min-cut theorem» maximum amount of flow transferable through a network» equals minimum value among all simple cuts of the network Cut split of the nodes V into two disjoint sets S and T» S T = V» there are 2 V 2 possible cuts Capacity of cut (S, T):
29 Max-flow Min-cut - Example possible cuts Maximum flow = 0
30 Traffic Management Packet Level, Flow Level
31 Time Scales Packet Level» Queueing & scheduling at multiplexing points» Determines performance offered to packets over a short time scale (ms) Flow Level» Management of traffic flows & resource allocation ( ms to s)» Matching traffic flows to available resources Flow-Aggregate Level» Routing of aggregate traffic flows across the network (min to days)» Efficient utilization of resources; meeting of service levels» Traffic Engineering
32 End-to-End QoS Packet traversing network» encounters delay and possible loss» at various multiplexing points Packet buffer 2 N N End-to-end performance is the accumulation of per-hop performances
33 Quality of Service and Scheduling End-to-End QoS» Packet delay, packet loss» Performance level can be engineered by Buffer control, bandwidth control Admission control of traffic entering network Scheduling Concepts: fairness, priority Fair Queueing» Weighted Fair Queuing (WFQ)» Packetized Generalized Processor Sharing (PGPS) Guaranteed Service: WFQ, Rate-control
34 FIFO Queueing Arriving packets Packet discard when full Packet buffer Transmission link All packet flows share the same buffer Transmission Discipline: First-In, First-Out Buffering Discipline» Discard arriving packets if buffer is full» Random discard» Discard head-of-line (i.e. oldest, packet)
35 FIFO Queueing Cannot provide differential QoS to different packet flows Statistical delay guarantees via load control» Restrict number of flows allowed (connection admission control)» Difficult to determine performance delivered Finite buffer determines a maximum possible delay Buffer size determines loss probability» Depends on arrival & packet length statistics
36 FIFO Queueing with Discard Priority (a) Arriving packets Packet discard when full Packet buffer Transmission link (b) Arriving packets Class discard when full Packet buffer Class 2 discard when threshold exceeded Transmission link
37 Head Of Line (HOL) Priority Queueing Packet discard when full High-priority packets Transmission link Low-priority packets Packet discard when full When high-priority queue empty High priority queue serviced until empty High priority queue has lower waiting time Buffers can be dimensioned for different loss probabilities Surge in high priority queue can cause low priority queue to saturate
38 Delay HOL Priority Features Provides differential QoS High-priority classes can» get all the bandwidth» starve lower priority classes Per-class loads
39 Earliest Due Date Scheduling Arriving packets Tagging unit Sorted packet buffer Packet discard when full Transmission link Queue in order of due date» packets requiring low delay get earlier due date» packets without delay get indefinite or very long due dates
40 Fair Queueing / Generalized Processor Sharing Packet flow Packet flow 2 Approximated bit-level round robin service C bit/s Packet flow n Transmission link Each flow has its own logical queue» prevents hogging; allows differential loss probabilities C bit/s allocated equally among non-empty queues» transmission rate = C / n(t), where n(t)= # non-empty queues Idealized system assumes fluid flow from queues Implementation requires approximation» simulate fluid system; sort packets according to completion time in ideal system
41 Fluid Flow System Buffer at t=0 Buffer 2 at t=0 0 2 t Fluid-flow system: both packets served at rate /2 Both packets complete service at t = 2 Packet from buffer 2 waiting Packet-by-packet system: buffer served first at rate ; then buffer 2 served at rate. Packet from buffer 2 being served Packet from buffer being served 0 2 t
42 Fluid Flow Buffer at t=0 Buffer 2 at t=0 2 Fluid-flow system: both packets served at rate /2 Packet from buffer 2 served at rate t Packet from buffer 2 waiting Packet-by-packet fair queueing: buffer 2 served at rate Packet from buffer served at rate t
43 Fluid Flow with Weights Buffer at t=0 /4 Fluid-flow system: packet from buffer served at rate /4; Buffer 2 3/4 at t=0 Packet from buffer served at rate Packet from buffer 2 served at rate 3/4 0 2 t Packet from buffer waiting Packet-by-packet weighted fair queueing: buffer 2 served first at rate ; then buffer served at rate Packet from buffer served at rate Packet from buffer 2 served at rate 0 2 t
44 Packetized GPS/WFQ Arriving packets Tagging unit Sorted packet buffer Packet discard when full Transmission link Compute packet completion time in ideal system» add tag to packet» sort packet in queue according to tag» serve according to HOL
45 Bit-by-Bit Fair Queueing Assume n flows, n queues round = cycle serving all n queues If each queue gets bit per cycle Round number = number of cycles of service that have been completed rounds Current Round # If packet arrives to idle queue: Finishing time = round number + packet size in bits If packet arrives to active queue: Finishing time = finishing time of last packet in queue + packet size
46 Number of rounds = Number of bit transmission opportunities Rounds Buffer Buffer 2 Buffer n Packet completes transmission k rounds later Packet of length k bits begins transmission in this time Differential Service» If a traffic flow is to receive twice as much bandwidth as a regular flow, then its packet completion time would be half
47 Computing the Finishing Time F(i,k,t) = finish time of kth packet that arrives at time t to flow i P(i,k,t) = size of kth packet that arrives at time t to flow i R(t) = round number at time t rounds Generalize so R(t) continuous, not discrete R(t) grows at rate inversely proportional to n(t) Fair Queueing:(take care of both idle and active cases) F(i,k,t) = max{f(i,k-,t), R(t)} + P(i,k,t) Weighted Fair Queueing: F(i,k,t) = max{f(i,k-,t), R(t)} + P(i,k,t)/w i
48 Traffic Management at the Flow Level
49 Network Congestion Congestion 3 6 Congestion occurs when a surge of traffic overloads network resources Congestion Control» Preventive: Scheduling & Reservations» Reactive: Detect & Discard
50 Throughput Ideal Congestion Control Ideal effect of congestion control: resources used efficiently up to capacity available Controlled Uncontrolled Offered load
51 Congestion Control Open loop Closed loop
52 Open-Loop Control Network performance is guaranteed to all traffic flows that have been admitted into the network Initially for connection-oriented networks Key Mechanisms» Admission Control» Policing» Traffic Shaping» Traffic Scheduling
53 Bit/s Admission Control Flow negotiates contract with network Peak rate Average rate Specify requirements» Offered traffic (traffic contract) Peak, Average, Min Bit rate Maximum burst size» QoS required Delay, Loss Typical bit rate demanded by a variable bit rate information source Time Network computes resources needed» Effective bandwidth If flow is accepted: network allocates resources to ensure QoS as long as source conforms to contract
54 Policing Network monitors traffic flow continuously to ensure it meets traffic contract When a packet violates the contract network can discard or tag the packet giving it lower priority If congestion occurs tagged packets are discarded first Leaky Bucket Algorithm» commonly used policing mechanism» Bucket has specified leak rate for average contracted rate: r depth to accommodate variations in arrival rate: B» Arriving packet is conforming if it does not result in bucket overflow
55 Leaky Bucket Algorithm Leaky Bucket algorithm can be used to police arrival rate of a packet stream water poured irregularly leaky bucket water drains at a constant rate Leak rate corresponds to longterm rate Bucket depth corresponds to maximum allowable burst arrival packet per unit time Assume constant-length packet Let X = bucket content at last conforming packet arrival Let t a last conforming packet arrival time = depletion in bucket
56 Leaky Bucket Example I = 4, B=0, L=B-I=6 Packet arrival Nonconforming Time B Bucket content I * * * * * * * * * Time Non-conforming packets not allowed into bucket, hence not included in calculations
57 Leaky Bucket Algorithm Arrival of a packet at time t a X = X - (t a - LCT) Depletion rate: packet per unit time Current bucket content X < 0? Interarrival time Yes L=B-I I = increment per arrival, nominal interarrival time Non-empty No X = 0 Nonconforming packet arriving packet would cause overflow Yes X > L? No X = X + I LCT = t a conforming packet empty X = value of the leaky bucket counter X = auxiliary variable LCT = last conformance time conforming packet
58 Dual Leaky Bucket Dual leaky bucket to police PCR, SCR, and MBS: Incoming traffic Leaky bucket SCR and MBS Tagged or dropped Untagged traffic Leaky bucket 2 PCR and CDVT Tagged or dropped Untagged traffic PCR = peak cell rate CDVT = cell delay variation tolerance SCR = sustainable cell rate MBS = maximum burst size
59 Traffic Shaping Traffic shaping Policing Traffic shaping Policing Network A Network B Network C Networks police the incoming traffic flow Traffic shaping is used to ensure that a packet stream conforms to specific parameters Networks can shape their traffic prior to passing it to another network
60 Leaky Bucket Traffic Shaper Incoming traffic Size N Server Shaped traffic Packet Buffer incoming packets Play out periodically to conform to parameters Surges in arrivals are buffered & smoothed out Possible packet loss due to buffer overflow Too restrictive, since» conforming traffic does not need to be completely smooth
61 Leaky Bucket Traffic Shaper Controls the maximum instantaneous rate (leak rate) r of a flow» accepts bursty traffic on its input» eliminates bursts on the output While the buffer is not empty» the output flow is periodic (T = / r),» with rate r Maximum accepted Burst Size» MBS = B * R / (R r) for R > r
62 Token Bucket Traffic Shaper An incoming packet must have sufficient tokens before admission into the network Token Tokens arrive periodically ( r ) Size b Incoming traffic Size N Server Shaped traffic Packet Token rate regulates transfer of packets If sufficient tokens available, packets enter network without delay b determines how much burstiness allowed into the network
63 Token Bucket Shaping Effect The token bucket constrains the traffic from a source to be limited to b + r t bits in an interval of length t b bytes instantly b + r t r bytes/second t
64 Packet transfer with Delay Guarantees (a) A(t) = b+rt Token Shaper Bit rate > R > r e.g., using WFQ R(t) No backlog of packets R(t) (b) Buffer occupancy at 0 b Assume fluid flow for information Token bucket shaper allows burst of b then r byte/s» Since R>r, buffer never greater than b byte» Thus, mux < b/r Rate into second mux is r<r, so bytes are never delayed b R 2 b R - r Buffer occupancy at 2 t Empty t
65 Delay Bounds with WFQ / PGPS Assume» traffic shaped (token bucket) to parameters b & r» schedulers give flow at least rate R>r» H hop path» m is maximum packet size for the given flow» M maximum packet size in the network» R j transmission rate in jth hop Maximum end-to-end delay experienced by a packet from flow i is D b R ( H ) m R H j M R j
66 Scheduling for Guaranteed Service Suppose guaranteed bounds on end-to-end delay across the network are to be provided. Then» Call admission control procedure is required to allocate resources & set schedulers» Traffic flows from sources must be shaped/regulated so that they do not exceed their allocated resources Strict delay bounds can be met
67 Current View of Router Functions Routing Agent Reservation Agent Mgmt. Agent Admission Control [Routing database] [Traffic control database] Input driver Classifier Internet forwarder Pkt. scheduler Output driver
68 Closed-Loop Control Congestion control» Feedback information to regulate flow from sources into network» Based on buffer content, link utilization,» Examples: TCP at transport layer; congestion control at ATM level End-to-end vs. Hop-by-hop» Delay in effecting control Implicit vs. Explicit Feedback» Source deduces congestion from observed behavior» Routers/switches generate messages alerting to congestion
69 End-to-End vs. Hop-by-Hop Congestion Control Source Packet flow Destination (a) Source Destination (b) Feedback information
70 TCP Congestion Control End-to-end, Implicit Main idea» each source determines its capacity» based on criteria enabling flow fairness efficiency Received ACKs regulate packet transmission they are the source clock
71 Additive Increase/Multiplicative Decrease Changes in channel capacity adjustment of transmission rate New variable per connection CongestionWindow Bitrate (byte/s) CongestionWindow/RTT Objective» If network congestion decreases CongestionWindow increases» If network congestion increases CongestionWindow decreases
72 Additive Increase/Multiplicative Decrease How does the source know if/when the network is in congestion? By timeout!» wired link low BER low FER» timeout occurrence loss of packet» packet loss buffer in router is full congestion
73 Additive Increase/Multiplicative Decrease Algorithm» increases CongestionWindow by segment for each RTT (Round Trip Time) additive increase Source Destination» divide CongestionWindow by 2 when there is a packet loss multiplicative decrease
74 KB Additive Increase/Multiplicative Decrease Saw-tooth behavior T ime (seconds)
75 Slow Start Objective» determine the available capacity Source Destination Behaviour» start by CongestionWindow = segment» double CongestionWindow by each RTT
76 Fast Retransmission, Fast Recovery Problem» if TCP timeout is large long inactivity period Sender Packet Packet 2 Packet 3 Packet 4 Receiver ACK ACK 2 Packet 5 ACK 2 Solution Packet 6 ACK 2» fast retransmission ACK 2 after 3 repeated ACKs Retransmit packet 3 ACK 6
77 Source Destination TCP Slow Start Slow Start» Sender starts with CongestionWindow=sgm» Doubles CongestionWindow by RTT When a segment loss is detected, by timeout» threshold = ½ congestionwindow(*)» CongestionWindow= sgm (router gets time to empty queues)» Lost packet is retransmitted» Slow start while congwindow<threshold» Then Congestion Avoidance phase (*) - in fact FlightSize, the amount of outstanding data
78 KB Congestion Avoidance Congestion Avoidance (additive increase)» increments congestionwindow by sgm, per RTT Detection of segment loss, by reception of 3 duplicated ACKs» Assumes packet is lost, Not by severe congestion, because following segments have arrived» Retransmits lost packet» CongestionWindow=CongestionWindow/2» Congestion Avoidance phase Source Destination T ime (seconds) 0.0
79 Desirable Bandwidth Allocation Max-min fairness Fair use gives bandwidth to all flows (no starvation)» Max-min fairness gives equal shares of bottleneck Bottleneck link max-min fair: maximizes the minimum bandwidth flows get
80 Desirable Bandwidth Allocation Bitrates along the time Bitrates must converge quickly when traffic patterns change Flow slows quickly when Flow 2 starts Flow speeds up quickly when Flow 2 stops CN5E by Tanenbaum & Wetherall, Pearson Education-Prentice Hall and D. Wetherall, 20
81 Homework Review slides Read from Leon-Garcia» Chapter 7 Packet Switching Networks Read from Tanenbaum» TCP Congestion control For formal analysis of these topics» Routing: Bertsekas & Gallager, Data Networks» Traffic and resource management: Anurag Kumar, D. Manjunath, Joy Kuri, Communication Networking - An Analytical Approach, Elsevier, 2004
Redes de Computadores. Shortest Paths in Networks
Redes de Computadores Shortest Paths in Networks Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto » What is a graph?» What is a spanning tree?» What is a shortest path tree?» How are
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationCongestion Control Open Loop
Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental
More informationCongestion in Data Networks. Congestion in Data Networks
Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet
More informationWhat Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues
168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity
More informationLink-State Routing OSPF
CE Computer Networks Link-State Routing OSPF Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by Jennifer
More informationLecture 4 Wide Area Networks - Congestion in Data Networks
DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number
More informationCHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL
CHAPTER 9: PACKET SWITCHING N/W & CONGESTION CONTROL Dr. Bhargavi Goswami, Associate Professor head, Department of Computer Science, Garden City College Bangalore. PACKET SWITCHED NETWORKS Transfer blocks
More informationResource allocation in networks. Resource Allocation in Networks. Resource allocation
Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationFlow Control. Flow control problem. Other considerations. Where?
Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationCommon network/protocol functions
Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: important topics not covered in introductory courses Overview:
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationRSVP 1. Resource Control and Reservation
RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows
More informationResource Control and Reservation
1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter
More informationComputer Networking. Queue Management and Quality of Service (QOS)
Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you
More informationOutline EEC-682/782 Computer Networks I. Midterm 1 Statistics. Midterm 1 Statistics. High 99, Low 34, Average 66
Outline EEC-682/782 Computer Networks I Lecture 12 Wenbing Zhao w.zhao1@csuohio.edu http://academic.csuohio.edu/zhao_w/teaching/eec682.htm (Lecture nodes are based on materials supplied by Dr. Louise Moser
More informationATM Quality of Service (QoS)
ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationMultiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource.
Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: Important topics not covered in introductory courses Overview:
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationOverview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services
Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling
More informationCongestion. Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets limited resources
Congestion Source 1 Source 2 10-Mbps Ethernet 100-Mbps FDDI Router 1.5-Mbps T1 link Destination Can t sustain input rate > output rate Issues: - Avoid congestion - Control congestion - Prioritize who gets
More informationQuality of Service (QoS)
CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5.4 Quality of Service Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud
More information"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.
We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when
More informationIntermediate Traffic Management
Intermediate Traffic Management This presentation has been generated by the ATM Forum for the purpose of educating the public on ATM Technology and the ATM Forum s activities. This presentation is the
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationKommunikationssysteme [KS]
Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/
More informationChapter 24 Congestion Control and Quality of Service 24.1
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationModule objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols
Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer
More informationTraffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011
Traffic Access Control Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Traffic Access Control Definition Traffic Shaping Traffic Policing The Leaky Bucket The Token
More informationPriority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies
CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation
More informationNetwork Layer Enhancements
Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable
More informationFrame Relay. Frame Relay: characteristics
Frame Relay Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Frame Relay: characteristics Packet switching
More informationDATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book & Slides: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks
More informationLecture 24: Scheduling and QoS
Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality
More informationLink State Rou.ng Reading: Sec.ons 4.2 and 4.3.4
Link State Rou.ng Reading: Sec.ons. and.. COS 6: Computer Networks Spring 0 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring/cos6/ Inside a router Goals of Today s Lecture Control plane:
More informationQueuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines
Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid
More informationCS244a: An Introduction to Computer Networks
Name: Student ID #: Campus/SITN-Local/SITN-Remote? MC MC Long 18 19 TOTAL /20 /20 CS244a: An Introduction to Computer Networks Final Exam: Thursday February 16th, 2000 You are allowed 2 hours to complete
More informationInternet Services & Protocols. Quality of Service Architecture
Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More informationCongestion Control. Queuing Discipline Reacting to Congestion Avoiding Congestion. Issues
Congestion Control Outline Queuing Discipline Reacting to Congestion Avoiding Congestion Issues Two sides of the same coin pre-allocate resources to avoid congestion (e.g. telephone networks) control congestion
More informationNetwork Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationLecture Outline. Bag of Tricks
Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information
More informationII. Principles of Computer Communications Network and Transport Layer
II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part
More informationETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control
ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 01 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Homework #4 Due Thursday, Nov 1 st Project # Due Tuesday, Nov 6 th Later this semester: Homework #5 Due Thursday,
More informationProject Computer Networking. Resource Management Approaches. Start EARLY Tomorrow s recitation. Lecture 20 Queue Management and QoS
Project 3 15-441 Computer Networking Start EARLY Tomorrow s recitation Lecture 20 Queue Management and QoS Lecture 20: QOS (c) CMU, 2005-10 2 Traffic and Resource Management Resource Management Approaches
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationOverview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems
Lecture 22 Queue Management and Quality of Service (QoS) Overview Queue management & RED Fair queuing Khaled Harras School of Computer Science niversity 15 441 Computer Networks Based on slides from previous
More informationTELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)
TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors
More informationETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control
ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)
More informationAdvanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler
Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and
More informationCS CS COMPUTER NETWORKS CS CS CHAPTER 6. CHAPTER 6 Congestion Control
COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control COMPUTER NETWORKS CS 45201 CS 55201 CHAPTER 6 Congestion Control P. Farrell and H. Peyravi Department of Computer Science Kent State University
More informationProf. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service
Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationLecture 14: Congestion Control"
Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati
More informationQUALITY of SERVICE. Introduction
QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia
More informationLecture 14: Congestion Control"
Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Amin Vahdat, Dina Katabi Lecture 14 Overview" TCP congestion control review XCP Overview 2 Congestion Control
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling
More informationLecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren
Lecture 22: Buffering & Scheduling CSE 123: Computer Networks Alex C. Snoeren Lecture 23 Overview Buffer Management FIFO RED Traffic Policing/Scheduling 2 Key Router Challenges Buffer management: which
More informationLink State Rou.ng Reading: Sec.ons 4.2 and 4.3.4
Link State Rou.ng Reading: Sec.ons. and.. COS 6: Computer Networks Spring 009 (MW :0 :50 in COS 05) Michael Freedman Teaching Assistants: WyaN Lloyd and Jeff Terrace hnp://www.cs.princeton.edu/courses/archive/spring09/cos6/
More informationImproving QOS in IP Networks. Principles for QOS Guarantees
Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationCSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service
CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have
More informationRouting in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
More informationBandwidth Allocation & TCP
Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative
More informationWilliam Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing
William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route
More informationQoS Policy Parameters
CHAPTER 6 This chapter describes the parameters, both required and optional, for QoS provisioning using the ISC user interface. Service level QoS parameters include all entry fields in the VoIP, Management,
More informationComputer Networks. Course Reference Model. Topic. Congestion What s the hold up? Nature of Congestion. Nature of Congestion 1/5/2015.
Course Reference Model Computer Networks 7 Application Provides functions needed by users Zhang, Xinyu Fall 204 4 Transport Provides end-to-end delivery 3 Network Sends packets over multiple links School
More informationIntroduction to IP QoS
Introduction to IP QoS Primer to IP Quality of Service Aspects Queuing, Shaping, Classification Agenda IP QoS Introduction Queue Management Congestion Avoidance Traffic Rate Management Classification and
More informationChapter 12. Routing and Routing Protocols 12-1
Chapter 12 Routing and Routing Protocols 12-1 Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone
More informationCS321: Computer Networks Congestion Control in TCP
CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationData Communication Networks Final
Data Communication Networks Final Saad Mneimneh Visiting Professor Hunter College of CUNY NAME: This final test is take home... There are 8 Problems (but each problem has multiple parts, possibly on separate
More informationCongestion Control 3/16/09
Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if
More informationChapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION
Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service
More informationLesson 14: QoS in IP Networks: IntServ and DiffServ
Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved
More informationKent State University
CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-11, S-2 Congestion
More informationCS 457 Networking and the Internet. Shortest-Path Problem. Dijkstra s Shortest-Path Algorithm 9/29/16. Fall 2016
9/9/6 S 7 Networking and the Internet Fall 06 Shortest-Path Problem Given: network topology with link costs c(x,y): link cost from node x to node y Infinity if x and y are not direct neighbors ompute:
More informationCongestion Control in TCP
Congestion Control in TCP Antonio Carzaniga Faculty of Informatics University of Lugano May 6, 2005 Outline Intro to congestion control Input rate vs. output throughput Congestion window Congestion avoidance
More informationOutline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste
Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationRouting, Routers, Switching Fabrics
Routing, Routers, Switching Fabrics Outline Link state routing Link weights Router Design / Switching Fabrics CS 640 1 Link State Routing Summary One of the oldest algorithm for routing Finds SP by developing
More informationLecture 14: Performance Architecture
Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance
More informationConfiguring QoS CHAPTER
CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1
RATE CONTROL SCHEME IN DATA NETWORK Joy Eneh 1, Harris Orah 2 1 Department of Electrical and Electronic Engineering, Nnamdi Azikiwe University Awka, Anambra state, Nigeria. 2 Department of Electronic Engineering,
More informationUNIT 2 TRANSPORT LAYER
Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management
More informationCS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF
CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the
More informationTCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD)
Lecture 16 TCP Congestion Control Homework 6 Due Today TCP uses ACK arrival as a signal to transmit a new packet. Since connections come-and-go TCP congestion control must be adaptive. TCP congestion control
More information048866: Packet Switch Architectures
048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/
More informationCS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:
CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all
More information